Getting Started with z/OS Data Set Encryption

Getting Started with z/OS Data Set Encryption
Author: Bill White
Publisher: IBM Redbooks
Total Pages: 274
Release: 2021-12-10
Genre: Computers
ISBN: 0738460222


Download Getting Started with z/OS Data Set Encryption Book in PDF, Epub and Kindle

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Getting Started with Z/OS Data Set Encryption

Getting Started with Z/OS Data Set Encryption
Author: Bill White (Telecommunications engineer)
Publisher:
Total Pages:
Release: 2018
Genre: Computer security
ISBN: 9780738456874


Download Getting Started with Z/OS Data Set Encryption Book in PDF, Epub and Kindle

Getting Started with Z/OS Data Set Encryption

Getting Started with Z/OS Data Set Encryption
Author: Brad Andy Coulson Bill White Jacky Doll
Publisher:
Total Pages: 204
Release: 2018
Genre: Data mining
ISBN:


Download Getting Started with Z/OS Data Set Encryption Book in PDF, Epub and Kindle

Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Getting Started with Linux on Z Encryption for Data At-Rest

Getting Started with Linux on Z Encryption for Data At-Rest
Author: Bill White
Publisher: IBM Redbooks
Total Pages: 120
Release: 2019-04-08
Genre: Computers
ISBN: 0738457469


Download Getting Started with Linux on Z Encryption for Data At-Rest Book in PDF, Epub and Kindle

This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Leveraging Integrated Cryptographic Service Facility

Leveraging Integrated Cryptographic Service Facility
Author: Lydia Parziale
Publisher: IBM Redbooks
Total Pages: 38
Release: 2018-01-03
Genre: Computers
ISBN: 0738456551


Download Leveraging Integrated Cryptographic Service Facility Book in PDF, Epub and Kindle

Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data integrity, personal identification, digital signatures, and the management of cryptographic keys. Together with the cryptography features of the IBM Z family, it provides secure, high-performance cryptographic functions (such as the loading of master key values) that enable the hardware features to be used by applications. This IBM RedpaperTM publication briefly describes ICSF and the key elements of z/OS that address different security needs. The audience for this publication is cryptographic administrators and security administrators, and those in charge of auditing security in an organization.

Getting Started: Journey to Modernization with IBM Z

Getting Started: Journey to Modernization with IBM Z
Author: Makenzie Manna
Publisher: IBM Redbooks
Total Pages: 90
Release: 2021-03-15
Genre: Computers
ISBN: 0738459534


Download Getting Started: Journey to Modernization with IBM Z Book in PDF, Epub and Kindle

Modernization of enterprise IT applications and infrastructure is key to the survival of organizations. It is no longer a matter of choice. The cost of missing out on business opportunities in an intensely competitive market can be enormous. To aid in their success, organizations are facing increased encouragement to embrace change. They are pushed to think of new and innovative ways to counter, or offer, a response to threats that are posed by competitors who are equally as aggressive in adopting newer methods and technologies. The term modernization often varies in meaning based on perspective. This IBM® Redbooks® publication focuses on the technological advancements that unlock computing environments that are hosted on IBM Z® to enable secure processing at the core of hybrid. This publication is intended for IT executives, IT managers, IT architects, System Programmers, and Application Developer professionals.

Getting started with z/OS Container Extensions and Docker

Getting started with z/OS Container Extensions and Docker
Author: Lydia Parziale
Publisher: IBM Redbooks
Total Pages: 270
Release: 2021-07-12
Genre: Computers
ISBN: 0738458155


Download Getting started with z/OS Container Extensions and Docker Book in PDF, Epub and Kindle

IBM® z/OS® Container Extensions (IBM zCX) is a new feature of the next version of the IBM z/OS Operating System (z/OS V2.4). It makes it possible to run Linux on IBM Z® applications that are packaged as Docker container images on z/OS. Application developers can develop, and data centers can operate, popular open source packages, Linux applications, IBM software, and third-party software together with z/OS applications and data. This IBM Redbooks® publication helps you to understand the concepts, business perspectives and reference architecture for installing, tailoring, and configuring zCX in your own environment.

Getting Started with Linux on Z Encryption for Data At-Rest

Getting Started with Linux on Z Encryption for Data At-Rest
Author: Bill White
Publisher:
Total Pages: 100
Release: 2019
Genre:
ISBN:


Download Getting Started with Linux on Z Encryption for Data At-Rest Book in PDF, Epub and Kindle

This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z

IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z
Author: Bertrand Dufrasne
Publisher: IBM Redbooks
Total Pages: 116
Release: 2021-06-15
Genre: Computers
ISBN: 073845835X


Download IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z Book in PDF, Epub and Kindle

This IBM® Redbooks® publication will help you install, configure, and use the new IBM Fibre Channel Endpoint Security function. The focus of this publication is about securing the connection between an IBM DS8900F and the IBM z15TM. The solution is delivered with two levels of link security supported: support for link authentication on Fibre Channel links and support for link encryption of data in flight (which also includes link authentication). This solution is targeted for clients needing to adhere to Payment Card Industry (PCI) or other emerging data security standards, and those who are seeking to reduce or eliminate insider threats regarding unauthorized access to data.